#1
July 7th, 2014, 10:58 AM
| |||
| |||
Bank of Baroda last year clerical cadre question papers
Will you please share with me the Bank of Baroda last year clerical cadre question papers as it is very urgent for me?
|
#2
July 8th, 2014, 11:44 AM
| |||
| |||
Re: Bank of Baroda last year clerical cadre question papers
As you want to get the Bank of Baroda last year clerical cadre question papers so here is the information of the same for you: Some content of the file has been given here: Directions—(Q. 1–15) Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions. Mihir and Mahadev lived in the same village. While Mahadev owned the largest shop in the village, Mihir was a poor farmer. Both had large families, with many sons, daughtersin-law and grandchildren. One day, Mihir, tired of not being able to make ends meet, decided to leave the village and move to the city where they were sure to make enough to feed everyone. They said their goodbyes, packed their few belongings and set off. When night fell, they stopped under a large tree. There was a stream running nearby, where they could refresh themselves. Mihir told his sons to clear the area below the tree. He told his wife to fetch water. He instructed his daughters-in-law to make up the fire and started cutting wood from the tree himself. Now, in the branches of that tree sat a thief. He watched as Mihir’s family worked together. He also noticed they had nothing to cook. Mihir’s wife too thought the same, for she said to her husband, “Everything is ready. But what shall we eat ?” Mihir raised his hands to heaven and said, “Don’t worry. He is watching all this from above. He will help us.” The thief was worried. He had seen that the family was large and worked well together. Surely they did not know he was hiding in the branches ? He decided to make a quick getaway. He climbed down swiftly when they were not looking and ran for his life. But, he left behind his bundle of stolen jewels and money, which dropped down into Mihir’s lap. He opened it and jumped with joy when he saw the contents. The family promptly gathered its belongings and returned to the village. There was great excitement when they told everyone how they got rich. Mahadev thought this was a nice quick way to earn some money ! He commanded his family to pack some clothes and they set off as if on a journey. They stopped under the same tree and Mahadev started commanding everyone as Mihir had done. But no one in his family was willing to obey orders. They were used to having servants wait on them – so the one who went to the river to fetch water had a nice bath. The one who went to gather wood for the fire went off to sleep beneath the tree. And Mahadev only ordered everyone about, not bothering to do anything himself. Meanwhile the thief had returned to the tree. He noticed the family members were greedy and selfish. They would never be able to put up a fight together. Then, Mahadev and his wife started the conversation that they had rehearsed carefully. Mahadev’s wife said, “Everything is ready. But what shall we eat ?” Mahadev raised his hands upwards and said, “Don’t worry. He is watching all this from above. He will help us”. At this, the thief jumped down from the tree, knife in hand. Seeing him, everyone started running helter skelter to save themselves. The thief stole everything. Mahadev and his family had to return to the village empty-handed, having lost all the jewellery and gold they had taken with them. 1. Which of the following cannot be said about Mihir’s family ? (a) They respected and obeyed Mihir. (b) They were so poor that they sometimes had to starve. (c) They had no friends in the village when they were poor. (A) None (B) Only (c) (C) Only (b) and (c) (D) Only (b) (E) All (a), (b) and (c) Ans : (C) 2. Why did Mihir and his family decide to camp under the ‘thief’s tree’ ? (A) Being a large family they knew they could capture the thief (B) It was a convenient spot to camp for the night (C) It was the only tree large enough to shelter the whole family (D) there was a stream nearby and wood to build a house (E) Exhausted after the day’s travel they couldn’t walk any more Ans : (B) 3. Why did the thief leave the valuables he had stolen behind ? (A) Seeing Mihir’s faith in God the thief was filled with remorse (B) Feeling sorry for Mihir’s family he decided to donate the valuables to them (C) He was afraid that God would punish him for stealing (D) In his hurry to run away he forget to take the valuables along (E) He was confident that they were so well hidden that they would not be found Ans : (D) 4. Which of the following best describes Mahadev ? (A) He was a rich businessman (B) He bullied his wife so she obeyed him (C) He paid his servants well to look after his family’s needs (D) He was greedy and had cheated Mihir (E) He was brave and decided to trick the thief Ans : (A) 5. Why did Mihir’s family return to the village ? (A) To show off their newfound wealth (B) To buy back their land and start a business (C) They had no need to shift to the city (D) To share their wealth with the other villagers (E) They wanted to sing God’s praises to all the villagers Ans : (C) 6. What made Mihir utter the phrase, “He is watching all this from above.” ? (A) He had spotted the thief and wanted to frighten him off (B) He was telling his wife to trust God to look after them (C) It was a warming to his family members to stick together (D) He was begging the thief for help to feed his family (E) None of these Ans : (B) 7. Which of the following is TRUE in the context of the passage ? (A) Mahadev planned to seek his fortune in the city as Mihir had (B) Mihir’s family preferred to live in the city (C) Mahadev had no intention of moving to the city (D) Mahadev lost his entire life savings to the thief (E) The thief only robbed those whom he did not like Ans : (D) 8. Why did the thief return to the tree ? (A) To plot how to get his money back (B) He thought no one would look for him there (C) To keep a watch on Mahadev’s family (D) Not mentioned in the passage (E) None of these Ans : (D) 9. Why was the thief not afraid of Mahadev’s family ? (A) They had not brought their servants along to protect them (B) Seeing their wealth he suspected them of stealing his loot (C) He had weapons to defend himself (D) Mahadev’s family was not as large as Mihir’s (E) None of these Ans : (E) 10. How did the villagers react to Mihir’s new found wealth ? (A) They tried hard to coax him to reveal the secret of his wealth (B) They followed his example and became more devout (C) They pretended to happy for him but were secretly jealous (D) They each plotted to visit the tree and get rich quickly (E) None of these Ans : (E) Directions—(Q. 11–13) Which of the following is most similar in meaning to the word given in bold as used in the passage. 11. make(A) earn (B) estimate (C) prepare (D) build (E) settle Ans : (A) 12. lost (A) defeated (B) failed (C) forfeited (D) wasted (E) destroyed Ans : (D) 13. getaway (A) holiday (B) freedom (C) fantasy (D) escape (E) relaxation Ans : (D) Directions—(Q. 14–15) Which of the following is most opposite in meaning of the word given in bold as used in the passage. 14. rehearsed(A) repeated (B) forced (C) fake (D) unplanned (E) effortless Ans : (D) 15. willing (A) oblige (B) reluctant (C) distracted (D) determined (E) obstacle Ans : (B) Directions—(Q. 16–25) Read each sentence to find out whether there is any grammatical error or idiomatic error in it. The error, if any, will be in one part of the sentence. The letter of that part is the answer. If there is no error the answer is (E). (Ignore errors of punctuation, if any) 16. The majority of the population believes (A) / that the stock market is recovered (B) / and that it is the (C) / right time to buy shares. (D) No error (E) Ans : (B) 17. Seema’s new office is close (A) / to her residence so (B) / she will not longer (C) / have to travel by train. (D) No error (E) Ans : (C) 18. In the present guidelines, (A) / the bank is required to obtain (B) / a photograph from any person (C) / who wishes to open an account. (D) No error (E) Ans : (C) 19. Chetan puts in a lot (A) / of effort to ensure (B) / that the scheme was (C) / launched in March. (D) No error (E) Ans : (C) 20. As our economy is (A) / experiencing a recession, banks (B) / have became very cautious (C) / about giving loans. (D) No error (E) Ans : (C) 21. After retiring she spent (A) / most of her time teaching young (B) / doctors and motivating themselves (C) / to work in rural areas. (D) No error (E) Ans : (A) 22. Since this foreign bank has (A) / not performed very good this year (B) / it will not be setting / up any new branches. (D) No error (E) Ans : (B) 23. Our Chairman is deeply concerned (A) / about the environment (B) / and plans to take some steps to reduce the (C) / pollution caused by our factories. (D) No error (E) Ans : (E) 24. He was afraid that his parents (A) / would not allow him to (B) / make the film so he did (C) / not tell them about it. (D) No error (E) Ans : (E) 25. I was previously posted (A) / in Singapore and it (B) / took me a long time (C) / to accustom to the food. (D) No error (E) Ans : (D) Directions—(Q. 26–30) In each question below a sentence with four words printed in bold type is given. These are lettered as (A), (B), (C) and (D). One of these four words printed in bold may be either wrongly spelt or inappropriate in the context of the sentence. Find out the word which is wrongly spelt or inappropriate if any. The letter of that word is your answer. If all the words printed in bold are correctly spelt and also appropriate in the context of the sentence, mark (E) i.e. ‘All correct’ as your answer. 26. He was a member (A) of the original (B) committee which drafted (C) these recommendations. (D) All correct (E) Ans : (B) 27. Do not procede (A) with the transfer (B) of funds until you receive further (C) instructions. (D) All correct (E) Ans : (A) 28. Our branch is located (A) in a remote (B) area where water is scarcity (C) available. (D) All correct (E) Ans : (C) 29. To gain (A) their support, (B) you must convenience (C) them of the benefits (D) of the proposal. All correct (E) Ans : (C) 30. The deal we negotiated (A) has not been approved (B) by RBI and needs (C) to be revized. (D) All correct (E) Ans : (D) Directions—(Q. 31–35) Rearrange the following six sentences (a), (b), (c), (d), (e) and (f) in the proper sequence to form a meaningful paragraph; then answer the questions given below them. (a) A few minutes later he was hauled back on board the ship, on the captain’s orders. (b) One of the crew began to complain and moan about the situation and no one could silence him. (c) Marvelling at the change, the passengers asked for an explanation, to which the captain replied, “We never appreciate how well off we are in a situation until we fall into a worse one”. (d) During a voyage a great storm arose. (e) In exasperation the captain ordered him to be thrown overboard. (f) To everyone’s surprise, the man immediately went back to his post and silently began to work. 31. Which of the following should be the THIRD sentence after rearrangement ? (A) (a) (B) (b) (C) (c) (D) (d) (E) (e) Ans : (E) 32. Which of the following should be the FIRST sentence after rearrangement ? (A) (a) (B) (b) (C) (c) (D) (d) (E) (e) Ans : (D) 33. Which of the following should be the LAST (SIXTH) sentence after rearrangement ? (A) (b) (B) (c) (C) (d) (D) (e) (E) (f) Ans : (E) 34. Which of the following should be the SECOND sentence after rearrangement ? (A) (b) (B) (c) (C) (d) (D) (e) (E) (f) Ans : (A) 35. Which of the following should be the FIFTH sentence after rearrangement ? (A) (a) (B) (b) (C) (c) (D) (d) (E) (f) Ans : (C) Directions—(Q. 36–40) Which of the phrases (A), (B), (C) and (D) given below should replace the phrase given in bold in the following sentence to make the sentence meaningful and grammatically correct. If the sentence is correct as it is and no correction is required, mark (E) as the answer. 36. Ensure we have the necessary clearance is the responsibility of the legal department. (A) Ensuring we have (B) To ensure having (C) We have been ensured (D) Ensuring us having (E) No correction required Ans : (B) 37. They have decided to go ahead and implement which was discussed at last month’s conference in Chennai. (A) What we had discussed (B) Whatever discussion (C) That being discussed (D) Which has been discussed (E) No correction required Ans : (A) 38. To reduce costs, we should replace our current system by much efficient one. (A) Through more efficient (B) Efficiently by (C) With a more efficient (D) For better efficiency (E) No correction required Ans : (C) 39. Staff in the district offices can easily monitor whether the payments are being made in time. (A) Easily be monitored (B) Monitor easier whether (C) Easy to monitor that (D) Monitor easily (E) No correction required Ans : (E) 40. Most of the managers whom involved in the deal had previously worked for multinational banks. (A) Whose involved (B) Involvement with (C) Involving whom (D) Involved in (E) No correction required Ans : (D) Directions—(Q. 41–50) In the following passage there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case. One rainy day while driving me home from school my father stopped to offer a frail old man a lift. Though he was headed in the opposite …(41)…, my father insisted. By the time we …(42)… home it was late and I was tired and …(43)… with my father. That night, my father …(44)… me a bedtime story as usual–A …(45)… Emperor was once asked “Sire, while you …(46)… rich and powerful, your teacher doesn’t even …(47)… a piece of land yet you visit him, …(48)… don’t you summon him to court ?” The Emperor …(49)… and said, “You are mistaken, my teacher is …(50)… than I am. My land can be lost in a war but he possesses knowledge which can never be stolen.” “The old man was my teacher.” my father concluded. I have never forgotten the lesson my father ‘taught’ me that day. 41. (A) route (B) manner (C) direction (D) side (E) way Ans : (C) 42. (A) left (B) arrived (C) return (D) gone (E) reach Ans : (B) 43. (A) complained (B) annoying (C) hungry (D) upset (E) worried Ans : (D) 44. (A) taught (B) described (C) told (D) reads (E) related Ans : (C) 45. (A) greedy (B) honest (C) foolish (D) mighty (E) cruel Ans : (D) 46. (A) are (B) being (C) were (D) so (E) seem Ans : (A) 47. (A) own (B) earn (C) acquire (D) possessed (E) has Ans : (A) 48. (A) however (B) but (C) instead (D) when (E) why Ans : (E) 49. (A) shouted (B) silent (C) thinks (D) smiled (E) prayed Ans : (D) 50. (A) powerful (B) wise (C) wealthy (D) stronger (E) richer Ans : (E) 1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as .... (A) software suites (B) integrated software packages (C) software processing packages (D) personal information managers (E) none of these Ans : (A) 2. A data warehouse is which of the following ? (A) Can be updated by the end users (B) Contains numerous naming conventions and formats (C) Organized around important subject areas (D) Contains only current data (E) None of these Ans : (C) 3. ______________ servers store and manages files for network users. (A) Authentication (B) Main (C) Web (D) File (E) None of these Ans : (D) 4. All of the following are examples of real security and privacy risks Except _____ (A) hackers (B) spam (C) viruses (D) identify theft (E) None of these Ans : (B) 5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems . (A) Data (B) Sales (C) Query (D) (Point-of-sale (POS) (E) None of these Ans : (B) 6. The OSI model is divided into _______ processes called layers. (A) five (B) six (C) seven (D) eight (E) None of these Ans : (C) 7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together. (A) management (B) processing (C) utility (D) application (E) None of these Ans : (D) 8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat. (A) Servers (B) Embedded computers (C) Robotic computers (D) Mainframes (E) None of these Ans : (B) 9. The following are all computing devices , except......... (A) notebook computers (B) cellular telephones (C) digital scanners (D) personal digital assistants (E) None of these Ans : (C) 10. in a ring topology , the the computer in possession of the ______ can trasmit data (A) packet (B) data (C) access method (D) token (E) None of these Ans : (D) 11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____ (A) basic input/output system (B) secondary input/output system (C) peripheral input/output system (D) marginal input/output system (E) None of these Ans : (A) 12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive (A) Trojan horse (B) Boot sector (C) Script (D) Logic bomb (E) None of these Ans : (B) 13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer (A) The platform (B) Application software (C) Operating system (D) The motherboard (E) None of these Ans : (C) 14. Servers are computers that provide resources to other computers connected to a ___________ (A) mainframe (B) network (C) supercomputer (D) client (E) None of these Ans : (B) 15. A goal of data mining includes which of the following? (A) To explain some observed event or condition (B) To confirm that data exists (C) To analyze data for expected relationships (D) To create a new data warehouse (E) None of these Ans : (A) 16. URL stands for ........ (A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator (D) Uniform Research Locator (E) None of these Ans : (C) 17. A database management system (DBMS) is a ............ (A) hardware system used to create , maintain and provide controlled access to a database (B) hardware system used to create, maintain, and provide uncontrolled access to a database. (C) software system used to create, maintain, and provide uncontrolled access to a database. (D) software system used to create, maintain, and provide controlled access to a database. (E) None of these Ans : (D) 18. Which of the following is NOT a goal of transaction processing system ? (A) Capture , process and store transactions (B) Produce a variety of documents related to routine business activities (C) Reduce manual effort associated with processing business transactions (D) Produce standard reports used for management decision making (E) None of these Ans : () 19. A Proxy server is used for which of the following? (A) To provide security against unauthorized users (B) To process client requests for web pages (C) To process client requests for database access (D) To provide TCP/IP (E) None of these Ans : (B) 20. When data changes in multiple lists and all lists are not updated, this causes: (A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) None of these Ans : (D) 21. _____________ are words that a programming language has set aside for its own use. (A) Control worlds (B) Reserved words (C) Control structures (D) Reserved keys (E) None of these Ans : (B) 22. What is the primary difference between a virus and a worm? (A) A worm has the ability to self-propagate from an infected user's computer to other computers (B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program (C) A virus is very harmful to the computers it infects : a worm is not a serious a problem (D) Anti-virus software is effective in fighting viruses but not worms (E) None of these Ans : () 23. ______ describe what is database fields. (A) Structures (B) Field markers (C) Field definition (D) Field names (E) None of these Ans : (D) 24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection. (A) router (B) modem (C) node (D) cable (E) None of these Ans : (A) 25. A goal of normalization is to __________ (A) minimize the number of relationships (B) minimize the number of entities (C) minimize the number of tables (D) minimize the number of redundancy (E) None of these Ans : (D) 26. Granting an outside organization access to internet web pages is often implemented using a (n) ____ (A) extranet (B) intranet (C) internet (D) hacker (E) None of these Ans : (A) 27. Which term identifies a specific computer on the web and the main page of the entire site (A) URL (B) Web site address (C) Hyperlink (D) Domain name (E) None of these Ans : (A) 28. The code that relational database management systems use to perform their database task is referred to as ..... (A) QBE (B) SQL (C) OLAP (D) Sequel Server (E) None of these Ans : (B) 29. Chip is a common nickname for a (n): (A) transistor (B) resistor (C) integrated circuit (D) semiconductor (E) None of these Ans : (C) 30. The purpose of the primary key in a database is to: (A) unlock the database (B) provide a map of the data (C) uniquely identify a record (D) establish constraints on database operations. (E) None of these Ans : (B) 31. A _________ contains specific rules and words that express the logical steps of an algorithm. (A) programming language (B) syntax (C) programming structure (D) logic chart (E) None of these Ans : () 32. The design of the network is called the network: (A) architecture (B) server (C) transmission (D) type (E) None of these Ans : (A) 33. The most frequently used instructions of a computer program are likely to be fetched from: (A) the hard disk (B) cache memory (C) RAM (D) registers (E) None of these Ans : (B) 34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database. (A) data dictionary (B) data table (C) data record (D) data field (E) None of these Ans : (A) 35. Personal logs or journal entries posted on the Web are known as: (A) listservs (B) Webcasts (C) blogs (D) subject directories (E) None of these Ans : (C) 36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system. (A) command - based user interface (B) GUI (C) system utility (D) API (E) None of these Ans : (B) 37. The _____ manual tells you how to use a software program. (A) documentation (B) programming (C) technical (D) user (E) None of these Ans : () 38. Which of the following is NOT a type of broadband Internet connection? (A) Cable (B) DSL (C) Dial-up (D) Satellite (E) None of these Ans : (C) 39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as: (A) spyware (B) adware (C) spam (D) malware (E) None of these Ans : (D) 40. Making a field ______ meAns : that it cannot be left blank. (A) numeric (B) required (C) calculated (D) validated (E) None of these Ans : (B) 41. _________ is the process of finding errors in software code. (A) Debugging (B) Compiling (C) Testing (D) Running (E) None pf these Ans : () 42. ____________ are viruses that are triggered by the passage of time or on a certain date. (A) Boot-sector viruses (B) Macro viruses (C) Time bombs (D) Worms (E) None of these Ans : (C) 43. Linux is a (n) ____________ operating system. (A) open-source (B) Microsoft (C) Windows (D) Mac (E) None of these Ans : (A) 44. What is a backup? (A) Restoring the information backup (B) An exact copy of a system's information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these (E) None of these Ans : (D) 45. Which of the following places the common data elements in order from smallest to largest (A) character, file, record, field, database (B) character, record, field, database, file (C) character, field, record, file, database (D) Bit, byte, character, record, field, file, database, (E) None of these Ans : (C) 46. The internet is ...... (A) a large network of networks (B) an internal communication system for a business (C) a communication system for the Indian government (D) All of these (E) None of these Ans : (D) 47. ____________ are lists of commands that appear on the screen. (A) GUIs (B) Icons (C) Menus (D) Windows (E) None of these Ans : (C) 48. Which of the following statements is FALSE concerning file names? (A) Files may share the same name or the same extension but not both (B) Every file in the same folder must have a unique name (C) File extension is another name for file type (D) The file extension comes before the dot (.) followed by the file name (E) None of these Ans : (D) 49. Verification of a login name and password is known as: (A) configuration (B) accessibility (C) authentication (D) logging in (E) None of these Ans : (C) 50. Which of the following would most likely NOT be a symptom of a virus? (A) Existing program files and icons disappear. (B) The CD-ROM stops functioning. (C) The Web browser opens to an unusual home page. (D) Odd messages or images are displayed on the screen. (E) None of these Ans : (B) |
|